Executive Summary

Informations
Name CVE-2004-0653 First vendor Publication 2004-08-06
Vendor Cve Last vendor Modification 2024-11-20

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 2.1 Attack Range Local
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Solaris 9, when configured as a Kerberos client with patch 112908-12 or 115168-03 and using pam_krb5 as an "auth" module with the debug feature enabled, records passwords in plaintext, which could allow local users to gain other user's passwords by reading log files.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0653

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:2065
 
Oval ID: oval:org.mitre.oval:def:2065
Title: Kerberos Client Plaintext Password Vulnerability
Description: Solaris 9, when configured as a Kerberos client with patch 112908-12 or 115168-03 and using pam_krb5 as an "auth" module with the debug feature enabled, records passwords in plaintext, which could allow local users to gain other user's passwords by reading log files.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0653
Version: 1
Platform(s): Sun Solaris 9
Product(s): pam_krb5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:255
 
Oval ID: oval:org.mitre.oval:def:255
Title: Clear Text Password Logging Vulnerability
Description: Solaris 9, when configured as a Kerberos client with patch 112908-12 or 115168-03 and using pam_krb5 as an "auth" module with the debug feature enabled, records passwords in plaintext, which could allow local users to gain other user's passwords by reading log files.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0653
Version: 4
Platform(s): Sun Solaris 9
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1

Open Source Vulnerability Database (OSVDB)

Id Description
7254 Solaris Kerberos Client Cleartext Password Disclosure

Sun Solaris contains a flaw that may lead to an unauthorized password exposure. It is possible to gain access to plaintext passwords when the debug feature of pam_krb5 is enabled, but only if these two conditions are met: SunSolve patch 112908-12 or 115168-03 is installed and a service uses pam_krb5 as an "auth" module. Under these conditions, password authentication for the user will be logged in plaintext at LOG_DEBUG level, which may lead to a loss of confidentiality.

Nessus® Vulnerability Scanner

Date Description
2004-07-12 Name : The remote host is missing Sun Security Patch number 112908-38
File : solaris9_112908.nasl - Type : ACT_GATHER_INFO
2004-07-12 Name : The remote host is missing Sun Security Patch number 115168-24
File : solaris9_x86_115168.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://secunia.com/advisories/11940/
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57587
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101519-1
http://www.ciac.org/ciac/bulletins/o-172.shtml
http://www.kb.cert.org/vuls/id/523710
http://www.securityfocus.com/bid/10606
https://exchange.xforce.ibmcloud.com/vulnerabilities/16450
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2024-11-28 23:23:01
  • Multiple Updates
2024-11-28 12:06:09
  • Multiple Updates
2021-05-04 12:02:22
  • Multiple Updates
2021-04-22 01:02:31
  • Multiple Updates
2020-05-23 00:15:50
  • Multiple Updates
2017-10-11 09:23:22
  • Multiple Updates
2017-07-11 12:01:28
  • Multiple Updates
2016-04-26 12:51:52
  • Multiple Updates
2014-02-17 10:27:48
  • Multiple Updates
2013-05-11 11:42:13
  • Multiple Updates